[nss] Changes related to the fix for 636787 and 609612
Elio Maldonado
emaldonado at fedoraproject.org
Sat Sep 25 20:11:24 UTC 2010
commit 53ccaaaa268a5818e02e5a04b2a918bb2b2c7303
Author: Elio Maldonado <emaldona at redhat.com>
Date: Sat Sep 25 13:10:51 2010 -0700
Changes related to the fix for 636787 and 609612
system-pkcs11.txt has nss-sysinit enabled (#636787)
Added provides pkcs11-devel-static to comply with packaging guidelines (#609612)
nss.spec | 2 ++
system-pkcs11.txt | 4 ++--
2 files changed, 4 insertions(+), 2 deletions(-)
---
diff --git a/nss.spec b/nss.spec
index d9527b9..76c05c1 100644
--- a/nss.spec
+++ b/nss.spec
@@ -100,6 +100,7 @@ Header and Library files for doing development with Network Security Services.
%package pkcs11-devel
Summary: Development libraries for PKCS #11 (Cryptoki) using NSS
Group: Development/Libraries
+Provides: nss-pkcs11-devel-static = %{version}-%{release}
Requires: nss-devel = %{version}-%{release}
%description pkcs11-devel
@@ -494,6 +495,7 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/nsslowhash.h
- Prevent disabling of nss-sysinit on package upgrade (#636787)
- Create pkcs11.txt with correct permissions regardless of umask (#636792)
- Setup-nsssysinit.sh reports whether nss-sysinit is turned on or off (#636801)
+- Added provides pkcs11-devel-static to comply with packaging guidelines (#609612)
* Sat Sep 18 2010 Elio Maldonado <emaldona at redhat.com> - 3.12.7.99.4-1
- NSS 3.12.8 RC0
diff --git a/system-pkcs11.txt b/system-pkcs11.txt
index 0aa7a5c..c2f5704 100644
--- a/system-pkcs11.txt
+++ b/system-pkcs11.txt
@@ -1,5 +1,5 @@
-library=
+library=libnsssysinit.so
name=NSS Internal PKCS #11 Module
parameters=configdir='sql:/etc/pki/nssdb' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription=''
-NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30})
+NSS=Flags=internal,moduleDBOnly,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30})
More information about the scm-commits
mailing list